Aggregator
CVE-2009-1669 | smarty 2.6.22 function.math.php smarty_function_math input validation (EDB-8659 / Nessus ID 38935)
CVE-2009-1678 | Bitweaver up to 2.6 saveFeed version path traversal (EDB-8659 / BID-34910)
CVE-2009-1780 | Roboform Frax.dk Php Recommend up to 1.3 admin.php access control (EDB-8658 / BID-34909)
CVE-2009-1781 | Roboform Frax.dk Php Recommend up to 1.3 admin.php form_aula code injection (EDB-8658 / BID-34909)
CVE-2009-1661 | Anoldman utopic 1.0 rating sql injection (EDB-8655 / XFDB-50428)
CVE-2009-1674 | Microchip MPLAB IDE 8.30 cof memory corruption (EDB-8656 / SA35054)
CVE-2009-1779 | Roboform Frax.dk Php Recommend up to 1.3 admin.php form_include_template code injection (EDB-8658 / BID-34909)
JVN: 複数のFCNT製Android端末における認証回避の脆弱性
0day速修 | H3C SecCenter SMP 安全管理平台远程代码执行漏洞
CVE-2015-2040 | Cfdbplugin Contact Form DB 2.8.26 wp-admin/admin.php submit_time cross site scripting (ID 130311 / ID 13106)
CVE-2015-2017 | IBM WebSphere Application Server up to 6.1.0.47/7.0.0.38/8.0.0.11/8.5.5.7 response splitting (ID 124380 / SBV-54260)
CVE-2011-4914 | Linux Kernel up to 2.6.38.8 input validation (DSA-2389 / Nessus ID 57583)
CVE-2011-4913 | Linux Kernel up to 2.6.38.8 rose_parse_ccitt input validation (USN-1141-1 / Nessus ID 55104)
CVE-2015-2053 | McAfee Agent up to 5 Log Viewer input validation (Nessus ID 83954 / ID 123768)
CVE-2020-11023 | Oracle Health Sciences InForm 6.3.0 jQuery cross site scripting (EDB-49767 / Nessus ID 208606)
CVE-2022-35977 | Redis up to 6.0.16/6.2.8/7.0.7 Command integer overflow (GHSA-mrcw-fhw9-fj8j / Nessus ID 211963)
CVE-2022-35977 | Redis up to 6.0.16/6.2.8/7.0.7 integer overflow (GHSA-mrcw-fhw9-fj8j / Nessus ID 211963)
AI-based tools designed for criminal activity are in high demand
Multiple regional conflicts, such as Russia’s continued invasion of Ukraine and the Israel-Hamas conflict, have resulted in a surge in cyberattacks and hacktivist activities, according to Trellix. AI-driven ransomware boosts cybercrime tactics The research examines an increasingly complex ransomware ecosystem where groups have adopted advanced tools with embedded AI to spread ransomware. Trellix telemetry reveals China-affiliated threat actor groups remain a prevalent source of nation-state advanced persistent threat (APT) activities, with Mustang Panda generating more … More →
The post AI-based tools designed for criminal activity are in high demand appeared first on Help Net Security.
Modernizing incident response in the AI era
In this Help Net Security video, Gourav Nagar, Director of Information Security at Bill, discusses modernizing incident response in the era of AI and the cloud: Why this issue is important for organizations looking to stay ahead of rapidly evolving cyber threats. How to adapt traditional incident response processes for cloud-native and AI-driven environments. How to leverage automation and orchestration in incident response while maintaining human oversight. Strategies for cultivating a security-first culture and improving … More →
The post Modernizing incident response in the AI era appeared first on Help Net Security.